您要查找的是不是:
- Network Attack Technologies 网络攻击技术
- Finally, future develops in network attack tracing technologies are discussed including quantitative evaluation metrics, theoretical models, multicast systems, mobility abilities, ipv. 网络攻击源追踪技术在实时阻断或隔离攻击、追究相关责任、提供法律举证、威慑攻击者等方面具有非常积极的意义。
- Cyber war methods include computer network attack, transmitting computer viruses and other destructive hacking. 网战战法包括;攻击电脑网络系统;发送电脑病毒以及其它破坏性黑客行为.
- Due to continuous network attack, HKHA forum will be closed for maintenance. Sorry for any inconvenience caused. 因不断受到网络攻击,讨论区将暂时关闭以作维修,不便之处,敬请见谅。
- In the network attack that launched in the light of Estonia 2007, among them a means namely psywar. 在2007年针对爱沙尼亚发起的网络攻击中,其中一个方式即心理战。
- Cyber war methods include computer network attack, tra mitting computer viruses and other destructive hacking. 网战战法包括;攻击电脑网络系统;发送电脑病毒以及其它破坏性黑客行为.
- Key Technologies of Wireless Network Attack 无线网络攻击的关键技术
- Carnegie Mellon University develops attack tree modeling of network attack to describe attack information by a structured and reusable way. 网络攻击的攻击树建模方法是卡内基梅隆大学提出的一种以结构化、可重用的方式来描述攻击信息建模方法;
- Wireless network attack is an important analyzing technology for spy and disposal, encrypting and deciphering of wireless communication signals. 无线网络攻击关键是无线通信信号侦察处理、加密和密码分析技术。
- Although some technology problems need overcoming, intrusion detection technologies are steadily updated and mature as attack technologies continue to sophisticate. 尽管在技术上仍有许多未克服的问题,但正如攻击技术不断发展一样,入侵的检测技术也会不断的更新、成熟。
- Among the network attack meanings, Denial of Service ( DoS ) is one of important network attack, it mainly uses the bug of network protocol. 在这些网络攻击中,拒绝服务(Denial of Service,DoS)攻击作为一种重要的网络攻击手段,该攻击主要利用了网络协议的缺陷。
- Individuals to achieve a simple personal firewall, you can resist the basic conventional network attack, suitable for beginners to learn. 个人实现的一个简单的个人防火墙,可以抵抗基本常规的网络攻击,适合初学者学习。
- With the development of Hacker attack technology, the forthcoming productions in network security have already built a security dike, but these productions can not protect the Hacker attack very well. 在网络技术发展的同时黑客攻击技术也在飞速发展,相辅相承的网络安全也从无到有。 现有的网络安全产品已经为网络建立了一道安全防护屏障,但这些产品对快速发展的黑客攻击仍是防不胜防。
- Network attack effect evaluation needs to build a set of evaluation indices system.The importance of the indices varies by a certain attack. 进行网络攻击效果评估需要建立一套评估指标体系,针对具体的攻击,评估体系中指标的重要性各不相同。
- Along with network attack increasing,the important network section will trace the network aggressor and protect its own right by the law. 随着网络攻击事件的不断增加,重要的网络部门需要追踪到网络攻击者,并运用法律武器保护自己的权益。
- States are conducting research in the context of network counterwork, personnel engaged in network counterwork need to network attack techniques. 在各国竞相开展网络对抗研究的背景下,从事网络对抗的相关人员掌握网络进攻技术是必要的。
- The principles and some familiar open source tools of network security technologies are summarized, based on which a platform of network attacking & defense and its architecture are presented and a virtual network environment is also implemented. 本文总结了网络安全技术的基本原理和一些常见的开放源码网络安全工具,在此基础上提出了网络攻防平台及其总体结构框架,实现了网络攻防平台的虚拟网络环境;
- As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack. 如前面所述,启用WebSphere Application Server安全性使得大多数内部传输都使用SSL来保护其不受各种形式的网络攻击。
- Current increase in network bandwidth and frequently network attack raise an aggressive challenge in network security systems based stateful packet inspection. 摘要 网络带宽的增长和频繁的网络攻击给状态封包检测等网络安全系统的性能带来了很大挑战。
- This instructs the firewall to reject any traffic except the trusted hosts you have specified and makes you invulnerable to certain types of network attack, such as ARP-spoofing. 指示防火墙拒绝任何除了您指定的信任,使你无懈可击某些类型的网络攻击,如ARP,欺骗主机流量。